Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 09:08
Static task
static1
Behavioral task
behavioral1
Sample
e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe
-
Size
283KB
-
MD5
e5ac5c4d432b5a1ec4b1a2920a148abf
-
SHA1
eb98c6c332fc45ff5a6332f4bde69297662230d0
-
SHA256
eebab36d5147c2a87ef6cb03dca876a72a6cc5a5fb7fd3b5b081163bfb2b3a2e
-
SHA512
c0d888790f43b8f690a65f82002d6af6c212ff03737a083498926b7530dfa57e48830cd72b3a113fc3b2fdd0abdabb3cf0c8ea75da262998a6c8ad95d105e3d5
-
SSDEEP
3072:02ulHM8xeHFGBlZXQ8AxHCe8qKViO7OaZpOBF7mB5Kvwz3z+radXq2yBrojcCyTG:02MeMBlZXpUHLO7OGCdU8Iz3zPobd8
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 3956 wingate32.exe 1552 wingate32.exe 3000 wingate32.exe 1592 wingate32.exe 4752 wingate32.exe 4844 wingate32.exe 4736 wingate32.exe 1624 wingate32.exe 4440 wingate32.exe 3964 wingate32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3716 wrote to memory of 3956 3716 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 82 PID 3716 wrote to memory of 3956 3716 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 82 PID 3716 wrote to memory of 3956 3716 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 82 PID 3956 wrote to memory of 1552 3956 wingate32.exe 90 PID 3956 wrote to memory of 1552 3956 wingate32.exe 90 PID 3956 wrote to memory of 1552 3956 wingate32.exe 90 PID 1552 wrote to memory of 3000 1552 wingate32.exe 92 PID 1552 wrote to memory of 3000 1552 wingate32.exe 92 PID 1552 wrote to memory of 3000 1552 wingate32.exe 92 PID 3000 wrote to memory of 1592 3000 wingate32.exe 94 PID 3000 wrote to memory of 1592 3000 wingate32.exe 94 PID 3000 wrote to memory of 1592 3000 wingate32.exe 94 PID 1592 wrote to memory of 4752 1592 wingate32.exe 95 PID 1592 wrote to memory of 4752 1592 wingate32.exe 95 PID 1592 wrote to memory of 4752 1592 wingate32.exe 95 PID 4752 wrote to memory of 4844 4752 wingate32.exe 96 PID 4752 wrote to memory of 4844 4752 wingate32.exe 96 PID 4752 wrote to memory of 4844 4752 wingate32.exe 96 PID 4844 wrote to memory of 4736 4844 wingate32.exe 97 PID 4844 wrote to memory of 4736 4844 wingate32.exe 97 PID 4844 wrote to memory of 4736 4844 wingate32.exe 97 PID 4736 wrote to memory of 1624 4736 wingate32.exe 98 PID 4736 wrote to memory of 1624 4736 wingate32.exe 98 PID 4736 wrote to memory of 1624 4736 wingate32.exe 98 PID 1624 wrote to memory of 4440 1624 wingate32.exe 99 PID 1624 wrote to memory of 4440 1624 wingate32.exe 99 PID 1624 wrote to memory of 4440 1624 wingate32.exe 99 PID 4440 wrote to memory of 3964 4440 wingate32.exe 100 PID 4440 wrote to memory of 3964 4440 wingate32.exe 100 PID 4440 wrote to memory of 3964 4440 wingate32.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1164 "C:\Users\Admin\AppData\Local\Temp\e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1160 "C:\Windows\SysWOW64\wingate32.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1104 "C:\Windows\SysWOW64\wingate32.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1140 "C:\Windows\SysWOW64\wingate32.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1124 "C:\Windows\SysWOW64\wingate32.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1144 "C:\Windows\SysWOW64\wingate32.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1152 "C:\Windows\SysWOW64\wingate32.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1120 "C:\Windows\SysWOW64\wingate32.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1156 "C:\Windows\SysWOW64\wingate32.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1168 "C:\Windows\SysWOW64\wingate32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5e5ac5c4d432b5a1ec4b1a2920a148abf
SHA1eb98c6c332fc45ff5a6332f4bde69297662230d0
SHA256eebab36d5147c2a87ef6cb03dca876a72a6cc5a5fb7fd3b5b081163bfb2b3a2e
SHA512c0d888790f43b8f690a65f82002d6af6c212ff03737a083498926b7530dfa57e48830cd72b3a113fc3b2fdd0abdabb3cf0c8ea75da262998a6c8ad95d105e3d5